首页 > 最新文献

Other Conferences最新文献

英文 中文
A secure routing protocol for wireless sensor network 无线传感器网络的安全路由协议
Pub Date : 2024-06-06 DOI: 10.1117/12.3031963
Peishun Ye
In this paper, we design a Reputation-based Diffusion Routing (RDR) algorithm based on the reputation evaluation model for selective forwarding attacks in wireless sensor network routing. We introduce the reputation evaluation model to gather the monitoring mechanism of neighbor nodes to obtain more comprehensive security performance. The algorithm judges whether the routing is successful or not through the neighbor node monitoring and evaluates the reputation to defend the selective forwarding attack of internal nodes. It can bypass the area of malicious nodes, improve the success rate of data routing, and reduce energy consumption. The experimental results verify that the RDR algorithm can maintain a high transmission rate with a small energy consumption and can effectively defend malicious nodes.
本文针对无线传感器网络路由中的选择性转发攻击,设计了一种基于声誉评估模型的声誉扩散路由(RDR)算法。我们引入声誉评估模型来收集邻居节点的监测机制,以获得更全面的安全性能。该算法通过对邻居节点的监控判断路由是否成功,并通过声誉评估来防御内部节点的选择性转发攻击。它可以绕过恶意节点区域,提高数据路由的成功率,降低能耗。实验结果验证了 RDR 算法能以较小的能耗维持较高的传输速率,并能有效防御恶意节点。
{"title":"A secure routing protocol for wireless sensor network","authors":"Peishun Ye","doi":"10.1117/12.3031963","DOIUrl":"https://doi.org/10.1117/12.3031963","url":null,"abstract":"In this paper, we design a Reputation-based Diffusion Routing (RDR) algorithm based on the reputation evaluation model for selective forwarding attacks in wireless sensor network routing. We introduce the reputation evaluation model to gather the monitoring mechanism of neighbor nodes to obtain more comprehensive security performance. The algorithm judges whether the routing is successful or not through the neighbor node monitoring and evaluates the reputation to defend the selective forwarding attack of internal nodes. It can bypass the area of malicious nodes, improve the success rate of data routing, and reduce energy consumption. The experimental results verify that the RDR algorithm can maintain a high transmission rate with a small energy consumption and can effectively defend malicious nodes.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141378402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
In-vehicle CAN bus security communication protocol based on identity encryption 基于身份加密的车载 CAN 总线安全通信协议
Pub Date : 2024-06-06 DOI: 10.1117/12.3031907
Yao Feng, Guihe Qin, Zizhan Zhang, Guofeng Wang, Kunpeng Wang
The CAN network bus is one of the most widely used buses in the vehicle, but the lack of sufficient security mechanisms allows criminals to maliciously attack the vehicle, which is a very serious security risk. In this paper, an identity-based encryption algorithm is used to design a secure communication protocol for an in-vehicle CAN network. Compared with the method based on digital certificates, it reduces the overhead of verification, management, and storage of digital certificates. The combination of asymmetric key and symmetric key ensures sufficient security and a small-time cost for the data communication phase. In addition, the Hash Message Authentication Code (HMAC) is used to ensure the integrity and authenticity of the data during the transmission phase. Experimental results show that the proposed protocol can resist forgery attacks, tampering attacks, and replay attacks, and meet the real-time requirements of automotive-grade microcontrollers.
CAN 网络总线是车辆中应用最广泛的总线之一,但由于缺乏足够的安全机制,犯罪分子可以对车辆进行恶意攻击,这是一个非常严重的安全隐患。本文采用基于身份的加密算法设计了车载 CAN 网络的安全通信协议。与基于数字证书的方法相比,它减少了验证、管理和存储数字证书的开销。非对称密钥和对称密钥的结合确保了足够的安全性,并降低了数据通信阶段的时间成本。此外,哈希信息验证码(HMAC)用于确保数据在传输阶段的完整性和真实性。实验结果表明,所提出的协议可以抵御伪造攻击、篡改攻击和重放攻击,满足汽车级微控制器的实时性要求。
{"title":"In-vehicle CAN bus security communication protocol based on identity encryption","authors":"Yao Feng, Guihe Qin, Zizhan Zhang, Guofeng Wang, Kunpeng Wang","doi":"10.1117/12.3031907","DOIUrl":"https://doi.org/10.1117/12.3031907","url":null,"abstract":"The CAN network bus is one of the most widely used buses in the vehicle, but the lack of sufficient security mechanisms allows criminals to maliciously attack the vehicle, which is a very serious security risk. In this paper, an identity-based encryption algorithm is used to design a secure communication protocol for an in-vehicle CAN network. Compared with the method based on digital certificates, it reduces the overhead of verification, management, and storage of digital certificates. The combination of asymmetric key and symmetric key ensures sufficient security and a small-time cost for the data communication phase. In addition, the Hash Message Authentication Code (HMAC) is used to ensure the integrity and authenticity of the data during the transmission phase. Experimental results show that the proposed protocol can resist forgery attacks, tampering attacks, and replay attacks, and meet the real-time requirements of automotive-grade microcontrollers.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141376239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vehicle CAN bus intrusion detection model based on Bayesian network 基于贝叶斯网络的车辆 CAN 总线入侵检测模型
Pub Date : 2024-06-06 DOI: 10.1117/12.3032074
Kangyao Dong
With the rapid development of in-vehicle network technology, vehicle safety and protection are facing more and more challenges. The vehicle CAN bus is the main network for vehicle internal communication. However, due to its lack of necessary security mechanisms, the vehicle CAN bus is vulnerable to intrusion attacks. Therefore, developing an effective intrusion detection model is crucial to secure vehicle networks. This study proposes a vehicle CAN bus intrusion detection model based on Bayesian network. This model utilizes the probabilistic reasoning of Bayesian networks and the update characteristics of conditional probability, combined with the characteristic attributes of the vehicle CAN bus, to achieve accurate detection of potential intrusion behaviors. By learning historical data, the conditional probability of the Bayesian network can be updated to achieve real-time detection and prediction of intrusion behavior. In order to verify the effectiveness of the model, we used a real vehicle CAN bus data set for experiments. Experimental results show that the intrusion detection model based on Bayesian network has achieved good results in identifying and predicting intrusion behavior of the vehicle CAN bus. Compared with traditional intrusion detection methods, this model can provide higher accuracy and lower false alarm rate, effectively protecting the security of in-vehicle networks.
随着车载网络技术的飞速发展,车辆的安全保护面临着越来越多的挑战。车载 CAN 总线是车辆内部通信的主要网络。然而,由于缺乏必要的安全机制,车辆 CAN 总线很容易受到入侵攻击。因此,开发一种有效的入侵检测模型对确保车辆网络安全至关重要。本研究提出了一种基于贝叶斯网络的车辆 CAN 总线入侵检测模型。该模型利用贝叶斯网络的概率推理和条件概率的更新特性,结合车辆 CAN 总线的特征属性,实现对潜在入侵行为的精确检测。通过学习历史数据,可以更新贝叶斯网络的条件概率,从而实现对入侵行为的实时检测和预测。为了验证模型的有效性,我们使用了真实的车辆 CAN 总线数据集进行实验。实验结果表明,基于贝叶斯网络的入侵检测模型在识别和预测车辆 CAN 总线入侵行为方面取得了良好的效果。与传统的入侵检测方法相比,该模型能提供更高的准确率和更低的误报率,有效地保护了车载网络的安全。
{"title":"Vehicle CAN bus intrusion detection model based on Bayesian network","authors":"Kangyao Dong","doi":"10.1117/12.3032074","DOIUrl":"https://doi.org/10.1117/12.3032074","url":null,"abstract":"With the rapid development of in-vehicle network technology, vehicle safety and protection are facing more and more challenges. The vehicle CAN bus is the main network for vehicle internal communication. However, due to its lack of necessary security mechanisms, the vehicle CAN bus is vulnerable to intrusion attacks. Therefore, developing an effective intrusion detection model is crucial to secure vehicle networks. This study proposes a vehicle CAN bus intrusion detection model based on Bayesian network. This model utilizes the probabilistic reasoning of Bayesian networks and the update characteristics of conditional probability, combined with the characteristic attributes of the vehicle CAN bus, to achieve accurate detection of potential intrusion behaviors. By learning historical data, the conditional probability of the Bayesian network can be updated to achieve real-time detection and prediction of intrusion behavior. In order to verify the effectiveness of the model, we used a real vehicle CAN bus data set for experiments. Experimental results show that the intrusion detection model based on Bayesian network has achieved good results in identifying and predicting intrusion behavior of the vehicle CAN bus. Compared with traditional intrusion detection methods, this model can provide higher accuracy and lower false alarm rate, effectively protecting the security of in-vehicle networks.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141377959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovative design and analysis of C language program based on game development orientation 基于游戏开发导向的 C 语言程序创新设计与分析
Pub Date : 2024-06-06 DOI: 10.1117/12.3032009
Jing Ning, Qingquan Cui
As a typical application basic development tool, C language programming has strong foundation and practicability in practical application. For most beginners of programming, how to effectively carry out the introduction and improvement of C language program is particularly important. Based on the above problems, this paper puts forward the methods and ideas of innovative design of C language program based on game development orientation, actively stimulates the enthusiasm and initiative of application learning, and introduces simple and easy small game content links to make learning interesting and practical. Through the innovative design of C language program based on the game development orientation, the application depth and learning efficiency of beginners are improved, and a good effect of innovative design practice is shown.
作为一种典型的应用基础开发工具,C 语言程序设计在实际应用中具有很强的基础性和实用性。对于大多数程序设计初学者而言,如何有效地进行C语言程序的入门与提高显得尤为重要。基于上述问题,本文提出了基于游戏开发导向的C语言程序创新设计方法与思路,积极激发应用学习的积极性与主动性,引入简单易行的小游戏内容环节,使学习趣味化、实用化。通过基于游戏开发导向的C语言程序创新设计,提高了初学者的应用深度和学习效率,体现了创新设计实践的良好效果。
{"title":"Innovative design and analysis of C language program based on game development orientation","authors":"Jing Ning, Qingquan Cui","doi":"10.1117/12.3032009","DOIUrl":"https://doi.org/10.1117/12.3032009","url":null,"abstract":"As a typical application basic development tool, C language programming has strong foundation and practicability in practical application. For most beginners of programming, how to effectively carry out the introduction and improvement of C language program is particularly important. Based on the above problems, this paper puts forward the methods and ideas of innovative design of C language program based on game development orientation, actively stimulates the enthusiasm and initiative of application learning, and introduces simple and easy small game content links to make learning interesting and practical. Through the innovative design of C language program based on the game development orientation, the application depth and learning efficiency of beginners are improved, and a good effect of innovative design practice is shown.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141377846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An approach for microservices-oriented migration based on business information and GNN 基于业务信息和 GNN 的面向微服务的迁移方法
Pub Date : 2024-06-06 DOI: 10.1117/12.3032029
Yantao Yang, Cheng Zhang
Microservices are popular because they have the advantages of loose coupling, low cohesion, and small and autonomous compared to monolithic systems. And when it comes to cloud deployment, it also has a natural advantage. As a result, more practitioners today choose to refactor monolithic applications into one or more microservices, each of which contains a set of partitions composed of components that point to some specific function of the original monolith, so that the entire software system can be represented by a graph, each component can be regarded as a node, and the dependencies between components can be regarded as edges between nodes. In recent years, there has been an approach to using graph neural networks (GNN) to help migrate from monoliths to microservices. However, due to the differences in the research field, some developers rely heavily on the source code of the monolithic system as an important basis for migration, but in the software field, the business information of the project also has a strong symbol for different microservices. Therefore, we will use GNN to comprehensively migrate microservices from the perspectives of business information and source code in the project. The findings indicate that our methodology is superior in efficiency compared to the migration of single features extracted solely from source code.
微服务之所以流行,是因为与单片系统相比,微服务具有松耦合、低内聚、小巧自主等优点。而在云部署方面,它也具有天然的优势。因此,如今越来越多的从业者选择将单体应用重构为一个或多个微服务,每个微服务都包含一组由组件组成的分区,这些组件指向原单体的某些特定功能,这样整个软件系统就可以用一个图来表示,每个组件都可以被视为一个节点,组件之间的依赖关系可以被视为节点之间的边。近年来,出现了一种使用图神经网络(GNN)来帮助从单体迁移到微服务的方法。不过,由于研究领域的差异,有些开发人员非常依赖单体系统的源代码作为迁移的重要依据,但在软件领域,项目的业务信息对于不同的微服务也具有很强的象征意义。因此,我们将利用 GNN 从项目的业务信息和源代码两个角度全面迁移微服务。研究结果表明,与仅从源代码中提取单一特征的迁移方法相比,我们的方法在效率上更胜一筹。
{"title":"An approach for microservices-oriented migration based on business information and GNN","authors":"Yantao Yang, Cheng Zhang","doi":"10.1117/12.3032029","DOIUrl":"https://doi.org/10.1117/12.3032029","url":null,"abstract":"Microservices are popular because they have the advantages of loose coupling, low cohesion, and small and autonomous compared to monolithic systems. And when it comes to cloud deployment, it also has a natural advantage. As a result, more practitioners today choose to refactor monolithic applications into one or more microservices, each of which contains a set of partitions composed of components that point to some specific function of the original monolith, so that the entire software system can be represented by a graph, each component can be regarded as a node, and the dependencies between components can be regarded as edges between nodes. In recent years, there has been an approach to using graph neural networks (GNN) to help migrate from monoliths to microservices. However, due to the differences in the research field, some developers rely heavily on the source code of the monolithic system as an important basis for migration, but in the software field, the business information of the project also has a strong symbol for different microservices. Therefore, we will use GNN to comprehensively migrate microservices from the perspectives of business information and source code in the project. The findings indicate that our methodology is superior in efficiency compared to the migration of single features extracted solely from source code.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141375899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-code vulnerability identification based on TextCNN 基于 TextCNN 的低代码漏洞识别
Pub Date : 2024-06-06 DOI: 10.1117/12.3031890
Yuqiong Wang, Yuxiao Zhao, Xiang Wang, Weidong Tang, Jinhui Zhang, Zhaojie Yang, Peng Wang, Jian Hu
Vulnerability identification is a crucial quality assurance step in software engineering, dedicated to discovering and handling potential errors and abnormal behavior in source code. Most vulnerability detection methods are designed for conventional programming languages. With the widespread adoption of low-code development, there is a need for a vulnerability detection method specifically tailored to low-code environments. Thus, we present a robust low-code vulnerability identification model by integrating Convolutional Neural Network Text Classification (TextCNN) and an attention mechanism. The resulting model is capable of recognizing potential irregular patterns in the low code, assisting developers in promptly identifying and addressing potential software defects. It holds significant importance in enhancing the maintainability, stability, and security of the system. Simultaneously, it offers substantial support for the company's software development efforts and mitigates the risk of software defects. The experimental results demonstrate that the method in this paper can achieve accurate low-code vulnerability identification.
漏洞识别是软件工程中一个重要的质量保证步骤,致力于发现和处理源代码中的潜在错误和异常行为。大多数漏洞检测方法都是针对传统编程语言设计的。随着低代码开发的广泛采用,需要一种专门针对低代码环境的漏洞检测方法。因此,我们通过整合卷积神经网络文本分类(TextCNN)和注意力机制,提出了一种稳健的低代码漏洞识别模型。由此产生的模型能够识别低代码中潜在的不规则模式,帮助开发人员及时发现并解决潜在的软件缺陷。它对提高系统的可维护性、稳定性和安全性具有重要意义。同时,它还能为公司的软件开发工作提供实质性支持,并降低软件缺陷的风险。实验结果表明,本文中的方法可以实现准确的低代码漏洞识别。
{"title":"Low-code vulnerability identification based on TextCNN","authors":"Yuqiong Wang, Yuxiao Zhao, Xiang Wang, Weidong Tang, Jinhui Zhang, Zhaojie Yang, Peng Wang, Jian Hu","doi":"10.1117/12.3031890","DOIUrl":"https://doi.org/10.1117/12.3031890","url":null,"abstract":"Vulnerability identification is a crucial quality assurance step in software engineering, dedicated to discovering and handling potential errors and abnormal behavior in source code. Most vulnerability detection methods are designed for conventional programming languages. With the widespread adoption of low-code development, there is a need for a vulnerability detection method specifically tailored to low-code environments. Thus, we present a robust low-code vulnerability identification model by integrating Convolutional Neural Network Text Classification (TextCNN) and an attention mechanism. The resulting model is capable of recognizing potential irregular patterns in the low code, assisting developers in promptly identifying and addressing potential software defects. It holds significant importance in enhancing the maintainability, stability, and security of the system. Simultaneously, it offers substantial support for the company's software development efforts and mitigates the risk of software defects. The experimental results demonstrate that the method in this paper can achieve accurate low-code vulnerability identification.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141381552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Core software supportability engineering of new generation information equipment 新一代信息设备的核心软件可支持性工程
Pub Date : 2024-06-06 DOI: 10.1117/12.3031926
haoyu qu
With the continuous development of Software-focused equipment, information equipment, as fundamental platform, needs to update functions, even reconfiguration. In the face of the generalization and servicelization, in order to realize the AI and software-define- equipment, systematic software supportability engineering is adopted. For core supporting software, based on software capability basement model, the architectural design details of the next-generation Information equipment are described, software management process is summarized including software grading, management demand and implementing keys. Based on the capability basement model, the defect rate of review is monitored and controlled. Using the process data model and capability model, the defect rate after delivery is predicted, and reliability is analyzed. The method provides key technically feasible research approach and provides case reference for next generation information equipment.
随着以软件为核心的设备的不断发展,作为基础平台的信息设备需要更新功能,甚至重新配置。面对通用化和服务化,为了实现人工智能和软件定义设备,需要采用系统的软件支持性工程。在核心支撑软件方面,基于软件能力地下室模型,描述了下一代信息设备的架构设计细节,总结了软件管理流程,包括软件分级、管理需求和实施关键。基于能力库模型,对审查缺陷率进行监控。利用过程数据模型和能力模型,预测交付后的缺陷率,分析可靠性。该方法提供了关键技术上可行的研究方法,为下一代信息设备提供了案例参考。
{"title":"Core software supportability engineering of new generation information equipment","authors":"haoyu qu","doi":"10.1117/12.3031926","DOIUrl":"https://doi.org/10.1117/12.3031926","url":null,"abstract":"With the continuous development of Software-focused equipment, information equipment, as fundamental platform, needs to update functions, even reconfiguration. In the face of the generalization and servicelization, in order to realize the AI and software-define- equipment, systematic software supportability engineering is adopted. For core supporting software, based on software capability basement model, the architectural design details of the next-generation Information equipment are described, software management process is summarized including software grading, management demand and implementing keys. Based on the capability basement model, the defect rate of review is monitored and controlled. Using the process data model and capability model, the defect rate after delivery is predicted, and reliability is analyzed. The method provides key technically feasible research approach and provides case reference for next generation information equipment.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141380982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzing technology based on suspicious basic block orientation 基于可疑基本区块定向的模糊技术
Pub Date : 2024-06-06 DOI: 10.1117/12.3032100
Yifan Feng
With the increasing complexity of software and the diversification of vulnerability forms, manual vulnerability mining can no longer meet the needs of software vulnerability mining, and automated vulnerability mining methods are becoming increasingly important. Fuzzing is one of the popular automated vulnerability mining techniques, which is widely used in software vulnerability mining due to its ease of deployment and efficiency. However, fuzzing has strong randomness, which leads to the generation of a large number of redundant and invalid inputs during the fuzzing process, wasting program execution time, resulting in low code coverage, and only a small number of inputs can truly trigger program exceptions. Therefore, the research on oriented fuzzing methods is becoming increasingly important. This article proposes a fuzzing method based on suspicious basic blocks, which uses LLVM in the static analysis stage to analyze the target program and identify the code that may have vulnerabilities. In fuzzing, tracking the execution of these codes, recording edge coverage information, prioritizing the selection of seeds that can trigger potential vulnerability areas for testing, and verifying the effectiveness of the proposed method through experiments.
随着软件的日益复杂和漏洞形式的多样化,人工漏洞挖掘已不能满足软件漏洞挖掘的需要,自动化漏洞挖掘方法变得越来越重要。模糊技术(Fuzzing)是目前流行的自动化漏洞挖掘技术之一,因其易于部署、效率高而被广泛应用于软件漏洞挖掘中。然而,模糊处理具有很强的随机性,导致在模糊处理过程中会产生大量冗余无效输入,浪费程序执行时间,造成代码覆盖率低,而且只有少数输入才能真正触发程序异常。因此,面向模糊方法的研究变得越来越重要。本文提出了一种基于可疑基本块的模糊方法,在静态分析阶段使用 LLVM 对目标程序进行分析,找出可能存在漏洞的代码。在模糊测试中,跟踪这些代码的执行情况,记录边缘覆盖信息,优先选择能够触发潜在漏洞区域的种子进行测试,并通过实验验证所提方法的有效性。
{"title":"Fuzzing technology based on suspicious basic block orientation","authors":"Yifan Feng","doi":"10.1117/12.3032100","DOIUrl":"https://doi.org/10.1117/12.3032100","url":null,"abstract":"With the increasing complexity of software and the diversification of vulnerability forms, manual vulnerability mining can no longer meet the needs of software vulnerability mining, and automated vulnerability mining methods are becoming increasingly important. Fuzzing is one of the popular automated vulnerability mining techniques, which is widely used in software vulnerability mining due to its ease of deployment and efficiency. However, fuzzing has strong randomness, which leads to the generation of a large number of redundant and invalid inputs during the fuzzing process, wasting program execution time, resulting in low code coverage, and only a small number of inputs can truly trigger program exceptions. Therefore, the research on oriented fuzzing methods is becoming increasingly important. This article proposes a fuzzing method based on suspicious basic blocks, which uses LLVM in the static analysis stage to analyze the target program and identify the code that may have vulnerabilities. In fuzzing, tracking the execution of these codes, recording edge coverage information, prioritizing the selection of seeds that can trigger potential vulnerability areas for testing, and verifying the effectiveness of the proposed method through experiments.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141379990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trajectory privacy preserving method for transmission resources 传输资源的轨迹隐私保护方法
Pub Date : 2024-06-06 DOI: 10.1117/12.3031947
Xing Zhang, Jiaruo Li, Yiran Cao, Zhaoming Su, Shitao Jiang
To protect the location privacy of key nodes in transmission routing, we have studied a trajectory privacy preserving method for transmission resources. By anonymizing the gis information of the whole route, that is, anonymizing all the location information including the first and last stations of the route. Firstly, the internal point of the whole optical cable is protected by grid protection method, and then a method based on Bayesian reasoning is proposed to protect the location privacy of the endpoints including starting point and destination. Through Bayesian inference process, it is proved that the starting point of optical cable routing can be protected by shear the point closest to the starting point and the destination, and the destination location protection algorithm can be obtained in the same way. In order to further improve the endpoints protection performance, we divide the day into different time spans according to the scene of optical cable inspection, and then integrate the anonymization process into this time span. By comparing the two endpoints prediction algorithms with Syn_sub and PBT, it is proved that the proposed endpoints protection algorithm is more effective than the classical algorithm.
为了保护传输路由中关键节点的位置隐私,我们研究了一种传输资源的轨迹隐私保护方法。通过对整个路由的 gis 信息进行匿名化处理,即对包括路由首末站在内的所有位置信息进行匿名化处理。首先通过网格保护方法对整条光缆的内部点进行保护,然后提出一种基于贝叶斯推理的方法来保护包括起点和终点在内的端点位置隐私。通过贝叶斯推理过程,证明光缆路由的起点可以通过剪切最靠近起点和终点的点来保护,终点位置保护算法也可以用同样的方法得到。为了进一步提高端点保护性能,我们根据光缆巡检的场景将一天划分为不同的时间跨度,然后将匿名化过程整合到这个时间跨度中。通过比较 Syn_sub 和 PBT 两种端点预测算法,证明所提出的端点保护算法比经典算法更有效。
{"title":"Trajectory privacy preserving method for transmission resources","authors":"Xing Zhang, Jiaruo Li, Yiran Cao, Zhaoming Su, Shitao Jiang","doi":"10.1117/12.3031947","DOIUrl":"https://doi.org/10.1117/12.3031947","url":null,"abstract":"To protect the location privacy of key nodes in transmission routing, we have studied a trajectory privacy preserving method for transmission resources. By anonymizing the gis information of the whole route, that is, anonymizing all the location information including the first and last stations of the route. Firstly, the internal point of the whole optical cable is protected by grid protection method, and then a method based on Bayesian reasoning is proposed to protect the location privacy of the endpoints including starting point and destination. Through Bayesian inference process, it is proved that the starting point of optical cable routing can be protected by shear the point closest to the starting point and the destination, and the destination location protection algorithm can be obtained in the same way. In order to further improve the endpoints protection performance, we divide the day into different time spans according to the scene of optical cable inspection, and then integrate the anonymization process into this time span. By comparing the two endpoints prediction algorithms with Syn_sub and PBT, it is proved that the proposed endpoints protection algorithm is more effective than the classical algorithm.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141379604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Isolate cache shield: defending cache attacks via cache set isolation 隔离高速缓存屏蔽:通过隔离高速缓存集防御高速缓存攻击
Pub Date : 2024-06-06 DOI: 10.1117/12.3032005
Kai Nie, Rongcai Zhao, Xiao Zhang, tongguang li
Cache isolation is a highly effective method for defending against cache side-channel attacks. This approach divides the cache into different isolation domains, assigning distinct domains to mutually untrusted processes, preventing processes from sharing the cache across domains. However, existing solutions have certain limitations. Cache partitioning based on ways has a limited number of isolation domains and may not fully meet users' practical needs. Page coloring schemes require proportional allocation of memory and cache, which is inflexible. This paper introduces ICS, a flexible and secure cache isolation solution. ICS supports up to hundreds of isolation domains, with memory allocation independent of the cache. Additionally, domain management is convenient. ICS is a set isolation solution, with its core being SMT. SMT modifies the mapping relationship between memory and LLC, directing the memory of different isolation domains to distinct cache sets. Implemented with a 1MB 16-way LLC, ICS can support a maximum of 512 isolation domains, with a storage overhead of approximately 1.3% and performance loss of around 1%. It represents a cost-effective method for defending against cache side-channel attacks.
高速缓存隔离是防御高速缓存侧通道攻击的一种高效方法。这种方法将高速缓存划分为不同的隔离域,将不同的域分配给互不信任的进程,防止进程跨域共享高速缓存。然而,现有的解决方案有一定的局限性。基于方式的高速缓存分区的隔离域数量有限,可能无法完全满足用户的实际需求。页面着色方案需要按比例分配内存和高速缓存,缺乏灵活性。本文介绍了一种灵活、安全的缓存隔离解决方案--ICS。ICS 支持多达数百个隔离域,内存分配与缓存无关。此外,域管理也很方便。ICS 是一种集合隔离解决方案,其核心是 SMT。SMT 可修改内存和 LLC 之间的映射关系,将不同隔离域的内存导向不同的高速缓存集。ICS 采用 1MB 16 路 LLC,最多可支持 512 个隔离域,存储开销约为 1.3%,性能损失约为 1%。它是防御高速缓存侧通道攻击的一种经济有效的方法。
{"title":"Isolate cache shield: defending cache attacks via cache set isolation","authors":"Kai Nie, Rongcai Zhao, Xiao Zhang, tongguang li","doi":"10.1117/12.3032005","DOIUrl":"https://doi.org/10.1117/12.3032005","url":null,"abstract":"Cache isolation is a highly effective method for defending against cache side-channel attacks. This approach divides the cache into different isolation domains, assigning distinct domains to mutually untrusted processes, preventing processes from sharing the cache across domains. However, existing solutions have certain limitations. Cache partitioning based on ways has a limited number of isolation domains and may not fully meet users' practical needs. Page coloring schemes require proportional allocation of memory and cache, which is inflexible. This paper introduces ICS, a flexible and secure cache isolation solution. ICS supports up to hundreds of isolation domains, with memory allocation independent of the cache. Additionally, domain management is convenient. ICS is a set isolation solution, with its core being SMT. SMT modifies the mapping relationship between memory and LLC, directing the memory of different isolation domains to distinct cache sets. Implemented with a 1MB 16-way LLC, ICS can support a maximum of 512 isolation domains, with a storage overhead of approximately 1.3% and performance loss of around 1%. It represents a cost-effective method for defending against cache side-channel attacks.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141378643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Other Conferences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1